CVE-2018-19441
low-risk
Published 2020-01-27
An issue was discovered in Neato Botvac Connected 2.2.0. The GenerateRobotPassword function of the NeatoCrypto library generates insufficiently random numbers for robot secret_key values used for local and cloud authentication/authorization. If an attacker knows the serial number and is able to estimate the time of first provisioning of a robot, he is able to brute force the generated secret_key of the robot. This is because the entropy of the secret_key exclusively relies on these two values, due to not seeding the random generator and using several constant inputs for secret_key computation. Serial numbers are printed on the packaging and equal the MAC address of the robot.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (1)
Botvac Connected Firmware
Affected Vendors
References (4)
Third Party Advisory
https://www.usenix.org/system/files/woot19-paper_ullrich.pdf
Third Party Advisory
https://www.youtube.com/watch?v=k5nj7Jhwn9c
Third Party Advisory
https://www.usenix.org/system/files/woot19-paper_ullrich.pdf
Third Party Advisory
https://www.youtube.com/watch?v=k5nj7Jhwn9c
17
/ 100
low-risk
Severity
12/34 · Low
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal